Biblio

Export 21393 results:
2013
Weigel, David. "Tamerlan Tsarnaev, Dead Bombing Suspect: ‘I Don’t Have a Single American Friend’." Slate (2013).
Andersson, Hilary. Tamerlan Tsarnaev Had Right-Wing Extremist Literature. BBC News, 2013.
Kashevarova, Anastasiya, and Yuliya Tsoy. "Tamerlan Tsarnaev Was Recruited by a Georgian Fund." Izvestia (2013).
Masters, Jonathan. Targeted Killings In Council on Foreign Relations, May 23, 2013., 2013.
McDermott, Roger. "Tashkent Strengthens Security Ties with Moscow Ahead of NATO Drawdown." Eurasia Daily Monitor 10, no. 36 (2013).
Technically Recoverable Shale Oil and Shale Gas Resources: An Assessment of 137 Shale Formations in 41 Countries Outside the United States. U.S. Energy Information Administration (EIA), 2013.
Sbardella, Alex. Ten Tips for Mobile UX. Red Ant Blog, 2013.
Acharya, A.. Ten years after 9/11: Rethinking the jihadist threat., 2013.
Tensions Rise in Georgia’s Breakaway Regions. Radio Free Europe – Radio Liberty, 2013.
Terrorism and Financial Intelligence. US Department of the Treasury, 2013.
Freeman, Michael, and Moyara Ruehsen. "Terrorism Financing Methods: An Overview." Perspectives on Terrorism 4, no. 7 (2013): 5-26.
Forster, Peter K.. "Terrorist Innovation: Homegrown Terrorism and the Internet." In The Dangerous Landscape, 79-86., 2013.
Abrams, Elliott. Tested by Zion: The Bush Administration and the Israeli-Palestinian Conflict. Cambridge University Press, 2013.
Zimmerman, Katherine L.. "Testimony: AQAP’s Role in the al Qaeda Network: Statement before the House Committee on Homeland Security Subcommittee on Counterterrorism and Intelligence." In Understanding the Threat to the Homeland from AQAP. American Enterprise Institute for Public Policy Research (AEI), 2013.
Stavridis, James G.. Testimony before the 113th Congress, House and Senate Armed Services Committee Testimony., 2013.
Malhotra, Rahul, and Prince Jain. "Testing Techniques and its Challenges in a Cloud Computing Environment." The SIJ Transactions on Computer Science Engineering & its Applications (CSEA) 1, no. 3 (2013).
Tethered Aerostat Systems Application Note: System Assessment and Validation for Emergency Responders (SAVER). Space and Naval Warfare Systems Center Atlantic, 2013.
"Text of President Obama’s May 23 speech on national security." Washington Post (2013).
Bamford, James. They know much more than you think. The New York Review of Books, 2013.
Howcroft, James. Things Americans Need to Know: How to Be Better Partners. Small Wars Journal, 2013.
Kahneman, Daniel. Thinking, Fast and Slow. New York: Farrar, Strauss, and Giroux, 2013.
Johnson, Loch J., and Allison M. Shelton. "Thoughts on the State of Intelligence Studies: A Survey Report." Intelligence and National Security 28, no. 1 (2013).
The Threat Landscape. Kaspersky, 2013.
-Janev, Hadji. "Threats to the Critical Infrastructure in South-East Europe posed by Al Qaeda and its Associated Movements: the case of Macedonia." In Counterterrorism challenges regarding the Critical Infrastructure protection. Vol. pp. 187-201. Center for Civil - Military Relation, Monterey, USA, Ljubljana, Slovenia, , 2013.
Tigran Sargsyan expressed dissatisfaction with the position of individual members of the Collective Security Treaty Organization and the CU regarding the Karabakh conflict. ArmInfo Information Agency, 2013.

Pages